CEL Launches Alphabet Soup Article


CEL’s new article, “Alphabet Soup: Understanding IoT Acronyms and How to Compare Them” was created to help product managers and IoT design engineers understand the ever changing and complex maze of communication standards and protocols involved with IoT and IoT solutions.  New ideas and protocols are becoming available at a rapid pace and some companies are pushing technologies that aren’t yet ready for prime time.

One of the most important decisions developers face is which communication protocols to choose. This decision impacts the hardware and what devices and functionality are available. Communication protocols need to be grouped together. Like puzzle pieces, only certain protocols can “connect” to each other.

Our technology “agnostic” blog will help your readers sort all of this out.

If you are interested, feel free to post this blog for your readers. I have attached the word doc and a high res image.

You can access the article directly online at:

http://blog.cortet.com/alphabet-soup-understanding-iot-acronyms-and-how-to-compare-them/

 Visit online at http://cortet.cel.com/

 



March 20, 2017


Topic Area: Press Release


Recent Posts

Biofilm 'Life Raft' Changes C. Auris Risk

Microscopic survival structure protects fungal pathogen from disinfectants and help it survive for long periods.


How Healthcare Restrooms Are Rethinking Water Efficiency

Manufacturers discuss strategies, technologies and design approaches that help healthcare facilities meet their sustainability goals.


Northwell Health Finds Energy Savings in Steam Systems

Case study: A proactive steam trap maintenance program is delivering millions in savings, fast payback and measurable carbon reductions across one of the nation’s largest health systems.


The Difference Between Cleaning, Sanitizing and Disinfecting

Cleaning methods and products have various purposes in reducing the spread of germs.


Jupiter Medical Center Falls Victim to Third-Party Data Breach

The third party has determined through an investigation that, at least as early as January 22, 2025, an unauthorized third party gained access to personal health information on legacy systems.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.